Analysts are constantly looking for ways to work smarter, not harder. Take the guesswork out of understanding threats and improve your security defenses, all with one powerful solution. In this upcoming webinar, analysts will walk away with knowledge on how to use MITRE ATT&CK and Attack Range to simulate attacks, validate detections, and generate data sets for further analysis, testing detections, building investigations, and writing playbooks. Jose Hernandez, senior threat research manager at Splunk, will also dive into the MITRE ATT&CK framework and adversary simulation tool, Atomic Red Team, for improving your defenses.
- Learn how to leverage the MITRE framework and adversary simulation to build detections
- Build a local Attack Range, a replicable environment pre-configured to collect attack logs into Splunk
- Validate detections in this environment by launching attacks and analyzing their events
Jose Hernandez, Sr. Manager, Security Research at Splunk
ELIGIBILITY: This webinar is open to RH-ISAC Core Members and retail and hospitality cybersecurity practitioners eligible for Core Membership. Ineligible registrants will have their registration canceled. To learn about eligibility, visit rhisac.org/membership. Email firstname.lastname@example.org with any questions.